Randomized logic against side channel attacks

a logic and side channel technology, applied in the field of logic circuits, to achieve the effect of reducing the propagation delay of logic signals

Active Publication Date: 2019-01-24
BAR ILAN UNIV
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0068]According to some embodiments of the invention, during static operation the delay ele

Problems solved by technology

Cryptographic devices are designed to protect secret information and provide s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Randomized logic against side channel attacks
  • Randomized logic against side channel attacks
  • Randomized logic against side channel attacks

Examples

Experimental program
Comparison scheme
Effect test

examples

[0171]Reference is now made to the following examples, which together with the above descriptions illustrate some embodiments of the invention in a non limiting fashion.

[0172]The examples discussed herein demonstrate part the new technique methodology against DPA / CPA attacks, the randomization and locations alternatives are presented through test circuit simulations and data process.

General Description of the Crypto-Core Architecture

[0173]An exemplary cryptographic module 1100 (also denoted herein a combinational block) is presented in FIG. 11.

[0174]The cryptographic module 1100 includes two main blocks; a combinatorial crypto-module 1110 containing the cryptographic logic and RMT2L units, and register arrays 1120 located at the input and output of the combinatorial logic. These blocks are connected to the VDD power domain where the DPA / CPA attacks use it for power traces recording. There are several configurations in which the RMT2L units may be located inside the S-box; a few exam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A randomization element includes a logic input for inputting a logic signal, a logic output for outputting the input logic signal at a delay and a randomization element. The randomization elements introduces the delay between said logic input and said logic output and operates selectably in static mode and in dynamic mode in accordance with a mode control signal. A logic circuit may be formed with randomization elements interspersed amongst the logic gates, to obtain protection against side channel attacks by inputting a selected control sequence into the randomization elements.

Description

FIELD AND BACKGROUND OF THE INVENTION[0001]The present invention, in some embodiments thereof, relates to a logic circuit designed for protection against side channel attacks, and, more particularly, but not exclusively, to a method for operating such a logic circuit to protect against side channel attacks.[0002]In the recent years the use of cryptographic devices storing secret and sensitive information has expanded and became essential in the communication area. Common uses for such cryptographic devices include secured: digital communications, credit cards transactions, smart cards, radio frequency identification (RFID) tags, and wireless sensor networks (WSN) communication. The importance of protecting cryptographic devices from many types of attacks has significantly grown. As a result, in addition to encryption algorithm implemented in the cryptographic devices and proved to be immune against mathematic / software attacks (linear or differential cryptanalysis), in most cases the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00G06F21/72G06F21/75
CPCH04L9/003G06F21/72G06F21/755H04L2209/12H04L2209/08G09C1/00
Inventor AVITAL, MOSHELEVY, ITAMARKEREN, OSNATFISH, ALEXANDER
Owner BAR ILAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products